-
981
-
982
-
983
Parallel graph-based anomaly detection technique for sequential data
Published 2022-01-01Get full text
Article -
984
Asset management using an extended Markowitz theorem
Published 2014-06-01“…The resulted model is an NP-Hard problem and the proposed study uses two metaheuristics, namely genetic algorithm (GA) and particle swarm optimization (PSO) to find efficient solutions. …”
Get full text
Article -
985
Transmission Error Prediction of RV Reducer based on SSA-BP
Published 2022-05-01“…There are many factors affecting the assembly quality of RV (Rotate Vector) reducer, and the assembly quality is unstable. …”
Get full text
Article -
986
Power losses reduction by optimal allocation of renewable distributed generation in distribution networks
Published 2023-06-01“…The electrical energy demand is increasing dramatically in many countries around the world due to population growth. …”
Get full text
Article -
987
The Linguistic Connotations of the Word Light in the Holy Quran (An analytical study of Quranic verses using Artificial intelligent techniques)
Published 2020-12-01“…Finally, the research has used the algorithm of “subtractive clustering and weighted subtractive clustering” measured and Matlab language (2013) to achieve the practical aspect of the study.…”
Get full text
Article -
988
Compressed CNN Plant Leaf Recognition Model Fused with Bayesian
Published 2021-06-01“…Firstly,the recursive Bayesian algorithm is used for network pruning to adaptively remove network redundancy. …”
Get full text
Article -
989
User Preference Maps: Quantifying the Built Environment
Published 2024-10-01“…The data, categorized into three main areas—activity, comfort, and natural elements—were evaluated, visualized, and restructured using a path exploration algorithm to produce a final user-based map. For this, 3D modeling software Rhino version 7, visual programming tool Grasshopper, and Grasshopper verion 2023 plugin programs were used. …”
Get full text
Article -
990
Blockchain-Enabled Federated Learning to Enhance Security and Privacy in Internet of Medical Things (IoMT)
Published 2023-01-01Get full text
Article -
991
Enhanced energy-efficient cluster-based routing with spotted hyena optimization in heterogeneous WSNs
Published 2025-05-01“…Abstract Wireless sensor networks (WSNs) are crucial in many applications; hence, it is important to have routing algorithms that are energy-efficient in order to extend the lifespan of the network. …”
Get full text
Article -
992
Research on Vehicle Path Planning Method with Time Windows in Uncertain Environments
Published 2024-12-01“…Numerical experiments demonstrate the superior performance of the hybrid algorithm, achieving lower total costs compared to standalone ant colony, zebra optimization, genetic algorithm, and particle swarm optimization algorithms. …”
Get full text
Article -
993
Distributed Task Allocation for UAV Swarms with Limited Communication
Published 2024-08-01“…Task allocation, a crucial aspect of UAV swarm autonomy, involves assigning sequential tasks to each aircraft based on environmental constraints and swarm status. While many task allocation algorithms assume reliable communication among agents, real-world environments often present challenges such as limited bandwidth and message interference. …”
Get full text
Article -
994
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
Published 2019-09-01“…In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. …”
Get full text
Article -
995
Using Prediction Confidence Factors to Enhance Collaborative Filtering Recommendation Quality
Published 2025-05-01“…Based on the application of the algorithm on widely used recommender systems datasets, the proposed algorithm significantly upgrades the recommendation quality, surpassing the performance of state-of-the-art research works that also consider confidence factors.…”
Get full text
Article -
996
Unveiling Public Sentiment on Quarter Life Crisis: A Comparative Performance Evaluation of Support Vector Machine and Naïve Bayes Algorithms on Social Media X Data
Published 2025-07-01“…Quarter Life Crisis (QLC) is one of the psychological issues experienced by many young adults and is characterized by uncertainty, anxiety, and emotional distress. …”
Get full text
Article -
997
Image processing method based on aerospace monitoring
Published 2021-07-01“…The processing method is realized by executing efficient algorithms for coding an image on a discrete grid by means of a chain code and spectral coding based on the fast discrete Hartley transform. …”
Get full text
Article -
998
NONLINEAR PROOF-OF-WORK: IMPROVING THE ENERGY EFFICIENCY OF BITCOIN MINING
Published 2020-09-01“…It employs the proof-of-work (PoW) consensus algorithm to add transactions to the blockchain. This process is better known as Bitcoin mining. …”
Get full text
Article -
999
Artificial Intelligence-Powered Recommender Systems for Promoting Healthy Habits and Active Aging: A Systematic Review
Published 2024-11-01“…Limitations include excluding simpler models. Despite many proposals, systematic adherence mechanisms are lacking. …”
Get full text
Article -
1000
Postdigital Bodies: Young People’s Experiences of Algorithmic, Tech-Facilitated Body Shaming and Image-Based Sexual Abuse during and after the COVID-19 Pandemic in England
Published 2024-07-01“…Young people repeatedly witness hateful and abusive comments that are algorithmically boosted. We argue that this toxic content normalises online hate in the form of body shaming and sexual shaming, developing the concept of the postdigital to analyse the offline, affective, embodied and material dimensions of online harm, harassment and abuse. …”
Get full text
Article